Asaf Nadler
Title
Cited by
Cited by
Year
Detection of malicious and low throughput data exfiltration over the DNS protocol
A Nadler, A Aminov, A Shabtai
Computers & Security 80, 36-53, 2019
682019
Tortoise and hares consensus: the meshcash framework for incentive-compatible, scalable cryptocurrencies
I Bentov, P Hubáček, T Moran, A Nadler
International Symposium on Cyber Security Cryptography and Machine Learning …, 2021
56*2021
Incentivized delivery network of IoT software updates based on trustless proof-of-distribution
O Leiba, Y Yitzchak, R Bitton, A Nadler, A Shabtai
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 29-39, 2018
262018
Maskdga: An evasion attack against dga classifiers and adversarial defenses
L Sidi, A Nadler, A Shabtai
IEEE Access 8, 161580-161592, 2020
17*2020
IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution
O Leiba, R Bitton, Y Yitzchak, A Nadler, D Kashi, A Shabtai
Pervasive and Mobile Computing 58, 101019, 2019
72019
Blockchain-based bug bounty framework
L Badash, N Tapas, A Nadler, F Longo, A Shabtai
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 239-248, 2021
2021
Helix: DGA Domain Embeddings for Tracking and Exploring Botnets
L Sidi, Y Mirsky, A Nadler, Y Elovici, A Shabtai
Proceedings of the 29th ACM International Conference on Information …, 2020
2020
MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic
Y Daihes, H Tzaban, A Nadler, A Shabtai
arXiv preprint arXiv:2008.02003, 2020
2020
Network security system with enhanced traffic analysis based on feedback loop
E Heiman, E Ben-Zvi, A Nadler
US Patent App. 16/168,451, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–9